Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2022-3770: GitHub - swzaq/swzaq

A vulnerability classified as critical was found in Yunjing CMS. This vulnerability affects unknown code of the file /index/user/upload_img.html. The manipulation of the argument file leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-212500.

CVE
#vulnerability#web#git#php

YJCMS file upload vulnerability****1. Vulnerability Background

Yunjing cms is developed by gansu yunjing digital technology co., ltd. YJcms (Cloudscape cms) is an open source PHP enterprise website building management system developed based on ThinkPaPHP5.0.24. Yjcms adheres to the concept of minimalist, fast and extreme development, integrates enterprise, tourism and mall modules for development, and is a module and plug-in that can be easily and rapidly expanded. To facilitate developers to quickly build their own applications.

Address of the company’s official website:http://www.xjyunjing.com/

Test targets:

1.https://gzyjg.cn/user_login.html
2.https://gsxwjks.com/user_login.html

2. Vulnerability exploitation process

The homepage of the normal website is shown as follows

This cms has the registration function

Entering the user path will jump to the login and registration page, as shown below

You can register and log in here

After registering the account, log in to the background as follows

After the account is registered, log in to the background and there is a file upload vulnerability in the modified avatar. However, the front-end verification is done here, so first change the php file to the image format

![]image/62.jpg)

The successful upload is shown as follows

Click OK to capture the package and return to the address of the uploaded file

/uploads/user_img/62c3aaf37efed.php

Accessing this file shows that the PHP file has been uploaded successfully

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda